Coordinated Disclosure Timeline

Project

Gstreamer

Tested Version

Details

Null pointer dereference in parse_lrc (GHSL-2024-263)

A null pointer dereference vulnerability has been detected in the parse_lrc function within gstsubparse.c.

The parse_lrc function calls strchr() to find the character ‘]’ in the string line. The pointer returned by this call is then passed to g_strdup().

However, if the string line does not contain the character ‘]’, strchr() returns NULL, and the following call to g_strdup(start + 1) leads to a null pointer dereference.

static gchar * parse_lrc (ParserState * state, const gchar * line){
...
  start = strchr (line, ']');
  if (start - line == 9)
    milli = 10;
  else
    milli = 1;
...
  return g_strdup (start + 1);
}

Impact

This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV).

CVE

Credit

This issue was discovered and reported by GHSL team member @antonio-morales (Antonio Morales).

Contact

You can contact the GHSL team at securitylab@github.com, please include a reference to GHSL-2024-263 in any communication regarding this issue.